CN106427282A - Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method - Google Patents

Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method Download PDF

Info

Publication number
CN106427282A
CN106427282A CN201610849192.2A CN201610849192A CN106427282A CN 106427282 A CN106427282 A CN 106427282A CN 201610849192 A CN201610849192 A CN 201610849192A CN 106427282 A CN106427282 A CN 106427282A
Authority
CN
China
Prior art keywords
binary
control variable
group
counterfeiting information
binary system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610849192.2A
Other languages
Chinese (zh)
Inventor
董智红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201610849192.2A priority Critical patent/CN106427282A/en
Publication of CN106427282A publication Critical patent/CN106427282A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/305Associated digital information

Landscapes

  • Printing Methods (AREA)

Abstract

The invention relates to a single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method. According to the method, binary modulating signals can be generated by binary anti-counterfeit information through ternary layering encryption and channel coding, the anti-counterfeit information is changed in order in an amplitude modulation net dot shape to be embedded in a whole Ren Min Bi webpage in a circulating table look-up method modulation manner, the anti-counterfeit information can be recognized from any fragment during Ren Min Bi recognition, and the method can be used in Ren Min Bi anti-counterfeit printing.

Description

Single parameter variable transmutation ternary layered encryption binary system RMB anti-counterfeiting printing process
Technical field:
The present invention relates to a kind of RMB anti-counterfeiting printing technology, particularly a kind of single parameter variable transmutation ternary layered encryption two enters RMB anti-counterfeiting printing process processed, this RMB anti-counterfeiting printing technology can be used for the anti-counterfeit printing of the RMB of various face amounts In.
Background technology:
Currency security is related to a national financial security, starts struggle that is false proof and faking from currency generation and does not just stop Breath, the RMB of China is audaciously innovated, and employs watermark anti-counterfeiting technology, safety line anti-counterfeiting technology, carved intaglio print Brush and gravure wiring anti-counterfeiting technology, red blue color fiber and colorless fluorescent fiber anti-counterfeiting technology, stealthy denomination digital anti-counterfeiting technology, Photochromatic printing ink printing denomination digital anti-counterfeiting technology, yin yang complementarity are to being patterned anti-counterfeiting technology, number convex print anti-counterfeiting technology, miniature literary composition Word anti-counterfeiting technology, colorless fluorescent pattern anti-counterfeiting technology, colored fluorescent pattern anti-fake technology and docking coincide etc. multinomial anti-counterfeiting technology, But struggle that is false proof and faking is high-tech trial of strength, more advanced anti-counterfeiting technology have certain ageing, therefore it is necessary to not So as to forever be in the leading position of anti-counterfeiting technology, this is also to maintain financial security of the country to disconnected lifting RMB anti-counterfeiting technology Basic assurance.
Content of the invention:
In order to improve reliability and the safety of RMB anti-counterfeiting, the present invention is directed to the deficiency of existing RMB anti-counterfeiting presence to existing RMB anti-counterfeiting technology is had to carry out improving it is proposed that the RMB that a kind of binary system coded signal modulates amplitude shape is prevented Pseudo- technology, this RMB anti-counterfeiting technology, by the change of amplitude shape during RMB is printed, anti-counterfeiting information is entered with two Coded signal form processed is embedded in the whole RMB page, can identify false proof from any one fragment when RMB identifies Information, therefore has very disguised by force and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:First line number is entered to image and character anti-counterfeiting information Wordization is processed, and generates 8 one group of binary system anti-counterfeiting information table using image and character anti-counterfeiting information, for preventing in ciphering process Produce information spillover, 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 16 one group of binary systems Anti-counterfeiting information, generates the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, by 16 one group binary system anti-counterfeiting information table In i-th group of 16 binary system anti-counterfeiting information be denoted as Ni, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as C, plus Close parameter C is the bigit of 0 C 255, and binary operator control variable is denoted as k, and binary operator control variable k is 0 The bigit of k 7, binary system control variable is denoted as j, n, d, e, f, g, h and m, control variable j, n, d, e, f, g, h and The value of m is the integer of 0 j 7, operatorUsing+,-, ×, tetra- kinds of ÷ Operator, during binary operator control variable k=0Be defined as+, during binary operator control variable k=1Fixed respectively Justice for+, ÷, during binary operator control variable k=2Be respectively defined as-, ÷ ,+, binary operator control become During amount k=3Be respectively defined as+, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, × ,+, ÷ ,-, during binary operator control variable k=5Be respectively defined as+, × ,+, ÷ ,-, ÷, during binary operator control variable k=6Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+, binary operator control variable k=7 WhenBe respectively defined as+, × ,+, ÷ ,-, ÷ ,+, ×, by 16 one group two I-th group of 16 binary system encryption anti-fake information in system encryption anti-fake information table are denoted as Ni, binary operator control variable k=0 Shi Sanyuan layered encryption operational formula is defined as, ternary layered encryption fortune during binary operator control variable k=1 Calculate formula to be defined as, ternary layered encryption operational formula definition during binary operator control variable k=2 For, during binary operator control variable k=3, ternary layered encryption operational formula is defined as, ternary layered encryption operational formula definition during binary operator control variable k=4 For, ternary layered encryption during binary operator control variable k=5 Operational formula is defined as, binary operator control variable k= When 6, ternary layered encryption operational formula is defined as , during binary operator control variable k=7, ternary layered encryption operational formula is defined asIf, Determine the initial value of encryption parameter C, set initial value j=0, n=0, d=0, e=0, f=0, g=0, h=0 and m=0 of j, n, d, e, f, g, h and m, Set 16 binary system anti-counterfeiting information N in 16 one group binary system anti-counterfeiting information tableiPosition control variable i=1, from 16 one First group 16 binary system anti-counterfeiting information N in group binary system anti-counterfeiting information table1Start, circulation adopts above-mentioned eight kinds of different encryptions Operational formula is encrypted computing to 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table, and each Carry out i+1, j+1, k+1, n+1, d+1, e+1, f+1, g+1, h+1 and m+1 computing while secondary cryptographic calculation, with i, j, k, n, The value change of d, e, f, g, h and m, by false proof to each group of 16 binary systems in 16 one group binary system anti-counterfeiting information table Information is encrypted computing, generates 16 one group binary system encryption anti-counterfeitings corresponding with 16 one group binary system anti-counterfeiting information table and believes Breath table, is digitized processing to the shape of amplitude in RMB printing, amplitude is shaped toWithTwo kinds, whereinBe defined as numeral 0,It is defined as numeral 1, using 16 generating in RMB printing process The binary system encryption anti-fake information of group is passed through to circulate the amplitude that look-up table is modulated on the RMB page, makes on the RMB page The regular shape according to above two amplitude of amplitude be changed, adjacent 16 on the RMB page after modulation Individual amplitude constitutes one group of 16 binary system anti-counterfeiting information so that taking by the change of amplitude shape on the RMB page Band anti-counterfeiting information, and so that this anti-counterfeiting information is embedded in whole RMB page site, realize RMB anti-counterfeiting.By in the people Non- in the coin page embed extractible anti-counterfeiting information obviously, can be real Renminbi provide valid certificates, have stronger simultaneously Anti- forgery ability, and do not increase extra anti-counterfeiting cost.
For solving above-mentioned technical problem, anti-counterfeiting information is digitized processing first, generates 8 one group of binary system Anti-counterfeiting information table, anti-counterfeiting information can be image information and Word message information, by 8 one group in binary system anti-counterfeiting information table Binary system anti-counterfeiting information expands to 16 one group of binary system anti-counterfeiting information, and 16 one group of binary systems that generation most-significant byte is all 0 are false proof 16 binary system anti-counterfeiting information of each of 16 one group binary system anti-counterfeiting information table are carried out layered encryption fortune by information table Calculate, generate 16 one group of binary system encryption anti-fake information table, using 16 binary systems in binary system encryption anti-fake information table Encryption anti-fake information, through chnnel coding, generates the binary modulated signal of 16 group with error detecting and error correcting function, letter RMB page original continuous can be changed the line map picture by road coding using loop coding, convolutional encoding or Turbo coding various ways Signal is processed through rasterizing(RIP)Export halftoning hybrid screening picture signal with hybrid screening, including amplitude With FM screened image signal, modulated using circulation look-up table modulation system using the 16 one group of binary modulated signals generating The shape of amplitude in halftoning hybrid screening picture signal, make the shape of amplitude according toWithRegular Raw change, makes adjacent 16 amplitudes in halftoning hybrid screening picture signal carry 16 binary systems by the change of shape Encryption anti-fake information, thus generate the halftoning hybrid screening image letter of embedded anti-counterfeiting information in whole RMB page site Number, realize the anti-counterfeit printing of RMB.
When extracting anti-counterfeiting information, gather RMB page halftone dot image signal first, through the shape to amplitude Fuzzy diagnosis, differentiate the shape of amplitude, extract the edge signal of amplitude and shape information, demodulate the RMB page The shape information of amplitude, the binary modulated signal of 16 one group of output, the binary system to 16 group of demodulation output Modulated signal carries out channel decoding, recovers to generate binary system deciphering anti-counterfeiting information table after channel decoding.
Binary system is deciphered 16 binary informations in anti-counterfeiting information table and is denoted as Hi, by ciphering process, extensive In the binary system deciphering anti-counterfeiting information table of repetitive generation, ternary layering deciphering computing during binary operator control variable k=0 is, during binary operator control variable k=1 ternary layering deciphering computing be, two enter During operator control variable k=2 processed ternary layering deciphering computing be, binary operator control variable k When=3 ternary layering deciphering computing be, ternary during binary operator control variable k=4 Computing is deciphered in layering, ternary during binary operator control variable k=5 Computing is deciphered in layering, binary operator control During variable k=6 ternary layering deciphering computing be , during binary operator control variable k=7 ternary layering deciphering computing be, will Recover 16 binary informations H in the binary system deciphering anti-counterfeiting information table generating after decodingiPosition control initial guess set For i=1, binary operator control variable initial value design is k=0, first from the binary system deciphering anti-counterfeiting information table recovering to generate Group H1Start, each group of 16 binary informations in anti-counterfeiting information table are deciphered to the binary system recovering to generate and carries out corresponding three Unit's layering deciphering computing, solves binary system anti-counterfeiting information Ni, generate the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, Remove most-significant byte, recover to generate 8 one group of binary system anti-counterfeiting information table, recover anti-counterfeiting signal and export anti-counterfeiting information.
Brief description
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 loads anti-counterfeiting information flow chart.
Fig. 2 extracts anti-counterfeiting information flow chart.
Specific embodiment
In loading anti-counterfeiting information flow process Fig. 1, original anti-counterfeiting information(Image, word)Encrypted, generate the two of 8 one group System anti-counterfeiting information table, 8 one group of binary informations in binary system anti-counterfeiting information table are expanded to 16 one group of binary system letters Breath, generates the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, i-th group in 16 one group binary system anti-counterfeiting information table 16 binary informations are denoted as Ni, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as C, and encryption parameter C is 0 C 255 bigit, binary operator control variable is denoted as k, and binary operator control variable k is the two of 0 k 7 to enter Integer processed, binary system control variable is denoted as j, n, d, e, f, g, h and m, and control variable j, n, d, e, f, g, h and m value are 0 j 7 integer, operatorUsing+,-, ×, tetra- kinds of operators of ÷, binary system calculate During symbol control variable k=0Be defined as+, during binary operator control variable k=1Be respectively defined as+, ÷, two enter During operator control variable k=2 processedBe respectively defined as-, ÷ ,+, during binary operator control variable k=3Be respectively defined as+, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, × ,+, ÷ ,-, during binary operator control variable k=5Be respectively defined as+, × ,+, ÷ ,-, ÷, during binary operator control variable k=6Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+, during binary operator control variable k=7Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+, ×, binary operator control variable k When=0, ternary layered encryption operational formula is defined as, ternary layered encryption computing during binary operator control variable k=1 Formula is defined as, during binary operator control variable k=2, ternary layered encryption operational formula is defined as, during binary operator control variable k=3, ternary layered encryption operational formula is defined as, ternary layered encryption operational formula definition during binary operator control variable k=4 For, ternary layered encryption fortune during binary operator control variable k=5 Calculate formula to be defined as, binary operator control variable k=6 Shi Sanyuan layered encryption operational formula is defined as , during binary operator control variable k=7, ternary layered encryption operational formula is defined asIf, Determine the initial value of encryption parameter C, set initial value j=0, n=0, d=0, e=0, f=0, g=0, h=0 and m=0 of j, n, d, e, f, g, h and m, Set 16 binary system anti-counterfeiting information N in 16 one group binary system anti-counterfeiting information tableiPosition control variable i=1, from 16 one First group 16 binary system anti-counterfeiting information N in group binary system anti-counterfeiting information table1Start, circulation adopts above-mentioned eight kinds of different encryptions Operational formula is encrypted computing to 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table, and each Carry out i+1, j+1, k+1, n+1, d+1, e+1, f+1, g+1, h+1 and m+1 computing while secondary cryptographic calculation, with i, j, k, n, The value change of d, e, f, g, h and m, by false proof to each group of 16 binary systems in 16 one group binary system anti-counterfeiting information table Information is encrypted computing, generates 16 one group binary system encryption anti-counterfeitings corresponding with 16 one group binary system anti-counterfeiting information table and believes Breath table, is digitized processing to the shape of amplitude in RMB printing, amplitude is shaped toWithTwo kinds, whereinBe defined as numeral 0,It is defined as numeral 1, using 16 generating in RMB printing process The binary system encryption anti-fake information of group is passed through to circulate the amplitude that look-up table is modulated on the RMB page, makes on the RMB page The regular shape according to above two amplitude of amplitude be changed, adjacent 16 on the RMB page after modulation Individual amplitude constitutes one group of 16 binary system anti-counterfeiting information so that taking by the change of amplitude shape on the RMB page Band anti-counterfeiting information, and so that this anti-counterfeiting information is embedded in whole RMB page site, realize RMB anti-counterfeiting printing.
In extracting anti-counterfeiting information flow process Fig. 2, when extracting anti-counterfeiting information, collection RMB page halftone dot image letter first Number, through the fuzzy diagnosis to the shape of amplitude, differentiate the shape of amplitude, extract amplitude edge signal and Shape information, the shape information of demodulation RMB page amplitude, the binary modulated signal of 16 one group of output, to demodulation The binary modulated signal of 16 group of output carries out channel decoding, recovers generation binary system deciphering false proof after channel decoding Information table.
Binary system is deciphered 16 binary informations in anti-counterfeiting information table and is denoted as Hi, by ciphering process, extensive In the binary system deciphering anti-counterfeiting information table of repetitive generation, ternary layering deciphering computing during binary operator control variable k=0 is, during binary operator control variable k=1 ternary layering deciphering computing be, two enter During operator control variable k=2 processed ternary layering deciphering computing be, binary operator control variable k= When 3 ternary layering deciphering computing be, ternary during binary operator control variable k=4 Computing is deciphered in layering, three during binary operator control variable k=5 Computing is deciphered in unit's layering, binary operator control change Amount k=6 when ternary layering deciphering computing be, two During system operator control variable k=7 ternary layering deciphering computing be, will Recover 16 binary informations H in the binary system deciphering anti-counterfeiting information table generating after decodingiPosition control initial guess set For i=1, binary operator control variable initial value design is k=0, first from the binary system deciphering anti-counterfeiting information table recovering to generate Group H1Start, corresponding ternary is carried out to each group of 16 binary informations in the binary system group anti-counterfeiting information table recovering generation Layering deciphering computing, solves binary system anti-counterfeiting information Ni, generate the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, go Fall most-significant byte, recover to generate 8 one group of binary system anti-counterfeiting information table, recover anti-counterfeiting signal and export anti-counterfeiting information.

Claims (1)

1. anti-counterfeiting information is passed through cryptographic calculation and chnnel coding and generates binary modulated signal by one kind, and is tabled look-up tune by circulation Anti-counterfeiting information is embedded in the single parameter variable transmutation ternary layered encryption binary system RMB anti-counterfeiting in full page by mode processed Printing process, is characterized in that:Anti-counterfeiting information is digitized, generates 8 one group of binary system anti-counterfeiting information table, anti-counterfeiting information It is image information and Word message, for preventing from producing information spillover in ciphering process, by 8 one in binary system anti-counterfeiting information table Group binary system anti-counterfeiting information expands to 16 one group of binary system anti-counterfeiting information, and 16 one group of binary systems that generation most-significant byte is all 0 are prevented Fake information table, i-th group of 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table are denoted as Ni, i is more than 0 Positive integer, eight-digit binary number encryption parameter is denoted as C, and encryption parameter C is the bigit of 0 C 255, binary operator Control variable is denoted as k, and binary operator control variable k is the bigit of 0 k 7, binary system control variable be denoted as j, n, D, e, f, g, h and m, control variable j, n, the value of d, e, f, g, h and m are the integer of 0 j 7, operatorUsing+,-, ×, tetra- kinds of operators of ÷, during binary operator control variable k=0Be defined as+, during binary operator control variable k=1Be respectively defined as+, ÷, during binary operator control variable k=2Be respectively defined as-, ÷ ,+, during binary operator control variable k=3It is respectively defined as +, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, × ,+, ÷ ,-, two During system operator control variable k=5Be respectively defined as+, × ,+, ÷ ,-, ÷, binary system calculate During symbol control variable k=6Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+, binary system calculate During symbol control variable k=7Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+, ×, will I-th group of 16 binary system encryption anti-fake information in 16 one group binary system encryption anti-fake information table are denoted as Ni, binary operator control During variable k=0 processed, ternary layered encryption operational formula is defined as, ternary layering during binary operator control variable k=1 Cryptographic calculation formula is defined as, ternary layered encryption operational formula during binary operator control variable k=2 It is defined as, during binary operator control variable k=3, ternary layered encryption operational formula is defined as, during binary operator control variable k=4, ternary layered encryption operational formula is defined as, ternary layered encryption computing during binary operator control variable k=5 Formula is defined as, during binary operator control variable k=6 Ternary layered encryption operational formula is defined as , during binary operator control variable k=7, ternary layered encryption operational formula is defined asIf, Determine the initial value of encryption parameter C, set initial value j=0, n=0, d=0, e=0, f=0, g=0, h=0 and m=0 of j, n, d, e, f, g, h and m, Set 16 binary system anti-counterfeiting information N in 16 one group binary system anti-counterfeiting information tableiPosition control variable i=1, from 16 one First group 16 binary system anti-counterfeiting information N in group binary system anti-counterfeiting information table1Start, circulation adopts above-mentioned eight kinds of different encryptions Operational formula is encrypted computing to 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table, and each Carry out i+1, j+1, k+1, n+1, d+1, e+1, f+1, g+1, h+1 and m+1 computing while secondary cryptographic calculation, with i, j, k, n, The value change of d, e, f, g, h and m, by false proof to each group of 16 binary systems in 16 one group binary system anti-counterfeiting information table Information is encrypted computing, generates 16 one group binary system encryption anti-counterfeitings corresponding with 16 one group binary system anti-counterfeiting information table and believes Breath table, is digitized processing to the shape of amplitude in RMB printing, amplitude is shaped toWithTwo kinds, whereinBe defined as numeral 0,It is defined as numeral 1, using 16 generating in RMB printing process The binary system encryption anti-fake information of group is passed through to circulate the amplitude that look-up table is modulated on the RMB page, makes on the RMB page The regular shape according to above two amplitude of amplitude be changed, adjacent 16 on the RMB page after modulation Individual amplitude constitutes one group of 16 binary system anti-counterfeiting information so that taking by the change of amplitude shape on the RMB page Band anti-counterfeiting information, and so that this anti-counterfeiting information is embedded in whole RMB page site, realize RMB anti-counterfeiting.
CN201610849192.2A 2016-09-25 2016-09-25 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method Pending CN106427282A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610849192.2A CN106427282A (en) 2016-09-25 2016-09-25 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610849192.2A CN106427282A (en) 2016-09-25 2016-09-25 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Publications (1)

Publication Number Publication Date
CN106427282A true CN106427282A (en) 2017-02-22

Family

ID=58169386

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610849192.2A Pending CN106427282A (en) 2016-09-25 2016-09-25 Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method

Country Status (1)

Country Link
CN (1) CN106427282A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN103106460A (en) * 2013-01-22 2013-05-15 北京印刷学院 Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106446A (en) * 2013-01-22 2013-05-15 北京印刷学院 One-parameter unary encryption anti-fake information storage brand
CN103106513A (en) * 2013-01-22 2013-05-15 北京印刷学院 Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106427A (en) * 2013-01-22 2013-05-15 北京印刷学院 Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103106442A (en) * 2013-01-22 2013-05-15 北京印刷学院 Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103116800A (en) * 2013-01-22 2013-05-22 北京印刷学院 Multi-parameter univariable gradient multivariate encryption anti-fake information storage trademark

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN103106460A (en) * 2013-01-22 2013-05-15 北京印刷学院 Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106446A (en) * 2013-01-22 2013-05-15 北京印刷学院 One-parameter unary encryption anti-fake information storage brand
CN103106513A (en) * 2013-01-22 2013-05-15 北京印刷学院 Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106427A (en) * 2013-01-22 2013-05-15 北京印刷学院 Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103106442A (en) * 2013-01-22 2013-05-15 北京印刷学院 Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103116800A (en) * 2013-01-22 2013-05-22 北京印刷学院 Multi-parameter univariable gradient multivariate encryption anti-fake information storage trademark

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN106427282A (en) Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106355623A (en) Single-parameter multi-variable binary layering encrypting binary RMB anti-counterfeiting printing method
CN106355622A (en) Single parameter variable gradient unary layering encrypting binary RMB anti-counterfeiting printing method
CN106427281A (en) Single-parameter single-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106427285A (en) Single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi
CN106427284A (en) Parametric layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi
CN106427286A (en) Single-parameter single-variable unitary layered encryption type binary anti-counterfeit printing method for Ren Min Bi
CN106427280A (en) Binary information encryption certificate anti-counterfeit printing method
CN106626876A (en) One-parameter variable transmutation binary layered encryption binary system Ren Min Bi anti-counterfeit printing method
CN106183533A (en) Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process
CN106183532A (en) One-parameter univariate binary layered encryption binary system RMB anti-counterfeiting printing process
CN106274136A (en) Parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process
CN106183535A (en) One-parameter multivariate ternary layered encryption binary system RMB anti-counterfeiting printing process
CN106427283A (en) Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method
CN106183534A (en) Parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process
CN106183530A (en) One-parameter variation transmutation multivariable layered encryption binary system RMB anti-counterfeiting printing process
CN106218262A (en) One-parameter univariable ternary layered encryption binary system RMB anti-counterfeiting printing process
CN106183531A (en) Parameter layering gradient binary encrypted binary RMB anti-counterfeiting printing process
CN106626875A (en) Single-parameter multi-variable unary layered encryption binary Renminbi anti-counterfeit printing method
CN106218263A (en) Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process
CN106427279A (en) Multi-information encryption certificate anti-counterfeit printing method
CN102945421B (en) Binary anti-fake printing method by reverse synchronous-progressing encryption
CN103116773A (en) Parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106508A (en) Single parameter ternary variable circulation encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170222

WD01 Invention patent application deemed withdrawn after publication